GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Language
  • 1
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Intelligent agents (Computer software). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (626 pages)
    Edition: 1st ed.
    ISBN: 9789811698736
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.286
    DDC: 004.6782
    Language: English
    Note: Intro -- Committees -- Chief Patron -- Patrons -- Finance Chair -- General Chair -- International Advisory Committee -- Program Chair -- Program Committee -- Organizing Chair -- Organizing Co-chair -- Conference Coordinator -- Convener -- Co-convenor -- Technical Program Committee Chairs -- Preface -- Contents -- About the Editors -- Part I Cloud Computing, Image Processing, and Software -- 1 An Intelligent Online Attendance Tracking System Through Facial Recognition Technique Using Edge Computing -- 1.1 Introduction -- 1.1.1 Motivation and Contribution -- 1.1.2 Organization of the Paper -- 1.2 Related Works -- 1.2.1 In the Year 2017 -- 1.2.2 In the Year 2018 -- 1.2.3 In the Year 2019 -- 1.2.4 In the Year 2020 -- 1.3 Significance of Edge Computing for Online Attendance Tracking System -- 1.4 Methodology -- 1.4.1 Student Registration -- 1.4.2 Faculty Registration -- 1.4.3 Image Capture -- 1.4.4 Face Detection -- 1.4.5 Extraction of Face Encodings -- 1.4.6 Face Recognition -- 1.4.7 Attendance Updation -- 1.5 Practical Implementation -- 1.6 Results and Discussion -- 1.7 Conclusion and Future Work -- References -- 2 Cloud Analytics: An Outline of Tools and Practices -- 2.1 Introduction -- 2.2 Related Work -- 2.3 Exploring the Ideology in Cloud-Based Analytics -- 2.4 Cloud Analytics Platforms -- 2.4.1 Qlik Sense Enterprise -- 2.4.2 Tableau -- 2.4.3 IBM Watson Analytics -- 2.4.4 Microsoft Power BI -- 2.4.5 TIBCO Spotfire X -- 2.4.6 SAS Business Analytics -- 2.5 Discussions -- 2.5.1 Benefits to Cloud-Based Analytics -- 2.5.2 Overview of Emerging Trends -- 2.6 Conclusion -- References -- 3 An Enhanced Fault-Tolerant Load Balancing Process for a Distributed System -- 3.1 Introduction -- 3.2 Background -- 3.2.1 Related Work -- 3.3 Proposed Enhanced Load Balancing Scheme with Resource Failure Rate Consideration -- 3.4 Simulated Results -- 3.4.1 Results. , 3.5 Conclusion -- References -- 4 HeartFog: Fog Computing Enabled Ensemble Deep Learning Framework for Automatic Heart Disease Diagnosis -- 4.1 Introduction -- 4.2 Related Works -- 4.3 HeartFog Architecture -- 4.3.1 Technology Used -- 4.3.2 Hardware Components Used -- 4.3.3 Software Components Used -- 4.4 HeartFog Design -- 4.4.1 Dataset -- 4.4.2 Heart Patient Data Pre-processing -- 4.4.3 Ensemble DL Application -- 4.4.4 Android Interface and Communication -- 4.4.5 Experimental Set-Up -- 4.4.6 Implementation -- 4.5 Results and a Discussion -- 4.6 Conclusion and Future Scope -- References -- 5 A Cloud Native SOS Alert System Model Using Distributed Data Grid and Distributed Messaging Platform -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Preliminaries -- 5.3.1 ZooKeeper as Cluster Coordinator -- 5.3.2 Kafka as a Data Streaming Platform -- 5.3.3 Ignite as the In-Memory Data Grid -- 5.4 Proposed Architecture -- 5.5 Implementation -- 5.6 Conclusion -- References -- 6 Efficient Peer-to-Peer Content Dispersal by Spontaneously Newly Combined Fingerprints -- 6.1 Introduction -- 6.2 Literature Review -- 6.3 Proposed Work -- 6.3.1 Overview -- 6.3.2 Framework Architecture -- 6.3.3 Content Uploading and Splitting -- 6.3.4 Fingerprint Detection -- 6.3.5 Content Distribution -- 6.3.6 Anonymous Communication Protocol -- 6.3.7 Identification of Illegal Distribution -- 6.4 Experimental Results -- 6.4.1 Content Uploading and Splitting -- 6.4.2 Fingerprint Generation -- 6.4.3 Content Distribution -- 6.4.4 Identifying and Preventing Illegal Redistribution -- 6.5 Conclusion -- References -- 7 An Integrated Facemask Detection with Face Recognition and Alert System Using MobileNetV2 -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Methodology -- 7.3.1 Facemask Detection Model -- 7.3.2 The Face-Recognition Model -- 7.3.3 Database -- 7.3.4 Web Application -- 7.4 Results. , 7.5 Conclusion -- References -- 8 Test Case Generation Using Metamorphic Relationship -- 8.1 Introduction -- 8.2 Usability of Successful Test Cases -- 8.3 The Formalization and Insight of Metamorphic Testing -- 8.4 Conclusion -- References -- Part II IoT/Network -- 9 IRHMP: IoT-Based Remote Health Monitoring and Prescriber System -- 9.1 Introduction -- 9.2 Previous Work -- 9.2.1 Architecture -- 9.2.2 Communication Protocol -- 9.3 IRHMP-IoT-Based Remote Health Monitoring and Prescriber System -- 9.3.1 Architecture -- 9.3.2 Functionalities Doctor -- 9.3.3 Implementation Working -- 9.4 Conclusion -- References -- 10 On Boundary-Effects at Cellular Automata-Based Road-Traffic Model Towards Uses in Smart City -- 10.1 Introduction -- 10.2 Review of the State-of-the-Art Available Works -- 10.3 Proposed Empirical Investigation -- 10.3.1 Search for More ECA Rules Toward Uses in Road-Traffic Simulation -- 10.3.2 Investigations on ECA Dynamics Toward Road-Traffic Simulation at Various Fixed-Boundary Situations -- 10.4 Detailed Discussions -- 10.5 Conclusive Remarks -- References -- 11 An Optimized Planning Model for Management of Distributed Microgrid Systems -- 11.1 Introduction -- 11.1.1 Components of a Micro Grid -- 11.1.2 Type of Micro Grid -- 11.2 Literature Survey -- 11.3 Proposed Model -- 11.3.1 Methodology -- 11.4 Results and Discussion -- 11.4.1 For PV System -- 11.4.2 For Wind System -- 11.4.3 For Fuel Cells Power Generating Systems -- 11.5 Conclusions -- References -- 12 Hard and Soft Fault Detection Using Cloud Based VANET -- 12.1 Introduction -- 12.2 Literature Study -- 12.3 Proposed Approach -- 12.3.1 Hard Permanent Fault Detection -- 12.3.2 Soft Fault Diagnosis -- 12.3.3 Fault Status Transmission Through Vehicular Cloud -- 12.4 Simulation Experiments and Discussions -- 12.5 Conclusion -- References. , 13 A Novel Intelligent Street Light Control System Using IoT -- 13.1 Introduction -- 13.2 Related Works -- 13.3 State of Art -- 13.3.1 Node MCU -- 13.3.2 PIR Sensor -- 13.3.3 Channel Relay -- 13.3.4 LDR -- 13.4 Proposed System -- 13.5 Features of Smart Street Light System -- 13.6 Results and Discussion -- 13.7 Conclusion and Future Scope -- References -- 14 Enhancing QoS of Wireless Edge Video Distribution using Friend-Nodes -- 14.1 Introduction -- 14.2 System Model -- 14.3 Video Dissemination Architecture -- 14.4 Simulation and Results -- 14.5 Conclusion -- References -- 15 Groundwater Monitoring and Irrigation Scheduling Using WSN -- 15.1 Introduction -- 15.2 Materials and Method -- 15.2.1 System Design -- 15.2.2 Data Collection -- 15.2.3 Hardware -- 15.2.4 Software and Database -- 15.2.5 Groundwater Level Measurement and Pumping Time -- 15.2.6 Crop Water Demand -- 15.2.7 Irrigation Water Requirements -- 15.2.8 Energy Consumption -- 15.2.9 Process Flow Diagram -- 15.2.10 Dashboard -- 15.3 Results -- 15.3.1 Discharge and Recharge of Groundwater -- 15.3.2 Electricity Consumption -- 15.3.3 Crop Water Demand -- 15.4 Conclusion -- References -- 16 A Soft Coalition Algorithm for Interference Alignment Under Massive MIMO -- 16.1 Introduction -- 16.2 System Model -- 16.3 Proposed Model -- 16.4 Experiment Results -- 16.5 Conclusion -- References -- Part III Optimization and Nature Inspired Methods -- 17 Improved Grasshopper Optimization Algorithm Using Crazy Factor -- 17.1 Introduction -- 17.2 Grasshopper Optimization Algorithms -- 17.2.1 Basic Grasshopper Optimization Algorithm (GOA) -- 17.2.2 Improved GOA with Crazy Factor (Crazy-GOA) -- 17.3 Result Analysis -- 17.4 Conclusion -- References -- 18 Reliability Estimation Using Fuzzy Failure Rate -- 18.1 Introduction -- 18.2 Reliability Using Fuzzy System -- 18.3 Discussion -- 18.4 Illustration. , 18.5 Conclusion -- References -- 19 A Sine Cosine Learning Algorithm for Performance Improvement of a CPNN Based CCFD Model -- 19.1 Introduction -- 19.2 Proposed SCA-CPNN-Based CCFD Model -- 19.2.1 Evaluation Criteria -- 19.3 Experimental Result Discussion -- 19.4 Conclusion -- References -- 20 Quality Control Pipeline for Next Generation Sequencing Data Analysis -- 20.1 Introduction -- 20.2 Background and Related Work -- 20.3 Datasets -- 20.4 Methods and Material -- 20.4.1 Duplicate Removal and Trimming -- 20.4.2 NGS Dataset -- 20.4.3 NULL Value Removal -- 20.4.4 Normalization -- 20.4.5 Dimensionality Reduction -- 20.5 Result Discussion -- 20.5.1 The Differentially Expressed Genes and Outlier Detection Visualization -- 20.5.2 The Differentially Expressed Gene Selection Using Dimension Reduction -- 20.6 Conclusion and Future Work -- References -- 21 Fittest Secret Key Selection Using Genetic Algorithm in Modern Cryptosystem -- 21.1 Introduction -- 21.1.1 Background -- 21.1.2 Motivation -- 21.1.3 Contribution -- 21.2 Preliminaries -- 21.2.1 Illustration of AVK -- 21.2.2 Genetic Algorithm -- 21.3 Proposed Work -- 21.4 Experiment Examples -- 21.5 Experiment Results -- 21.6 Performance Analysis -- 21.7 Randomness Verification -- 21.8 Conclusion -- 21.9 Future Work -- References -- 22 Variable Step Size Firefly Algorithm for Automatic Data Clustering -- 22.1 Introduction -- 22.2 Related Work -- 22.3 Variable Step Size Firefly Algorithm -- 22.4 Result Analysis -- 22.5 Conclusion -- References -- 23 GWO Based Test Sequence Generation and Prioritization -- 23.1 Introduction -- 23.1.1 Motivation -- 23.2 Basic Concept -- 23.2.1 GWO Algorithm -- 23.2.2 Adjacency Matrix -- 23.2.3 Objective Function/Fitness Function -- 23.3 Proposed Approach -- 23.3.1 Overview -- 23.3.2 Generation of Control Flow Graph -- 23.4 Implementation -- 23.4.1 Experimental Result. , 23.4.2 Prioritization.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Cytology ; Radiology, Medical ; Human Physiology ; Human physiology ; Neurosciences ; Stem cells ; Nanotechnology ; Oxidative stress. ; Radiology. ; Stroke physiopathology ; Stroke therapy ; Risk Factors
    Description / Table of Contents: Chapter 1. Cerebral stroke: An Introduction -- Chapter 2. Inflammation, oxidative stress, and neurodegeneration -- Chapter 3. Stroke induced blood brain barrier damage -- Chapter 4. Regulation of calcium ions in ischemic neuronal cell -- Chapter 5. Ischemic stroke induced endoplasmic reticulum stress -- Chapter 6. The role of autophagy in ischemic stroke: friend or foe?- Chapter 7. Critical role of mitochondrial autophagy in cerebral stroke -- Chapter 8. Application of neuroimaging in the identification of the pinpoint location of blockage -- Chapter 9. Emerging role of the electromagnetic field in stroke -- Chapter 10. Stem cell therapies for stroke -- Chapter 11. MicroRNA: Significance to stroke diagnosis, prognosis, and therapy -- Chapter 12. Therapeutic Aspects of Nanomedicines in Stroke Treatment -- Chapter 13. Neuroprotective potential of small molecule phytochemicals against stroke -- Chapter 14. Role of UV irradiation on neuroprotective potential of phytochemicals -- Chapter 15. Post-stroke treatment strategies, management, and rehabilitation
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource (VIII, 189 p. 23 illus., 12 illus. in color)
    ISBN: 9789811314537
    Series Statement: Springer eBooks
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computational intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (504 pages)
    Edition: 1st ed.
    ISBN: 9789811538636
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.179
    DDC: 6.3
    Language: English
    Note: Intro -- International Program Committee -- Honorary Chair -- General Chairs -- Organizing Chair -- International Advisory Chair -- Founder of IRNet China -- Co-founder of IRNet China -- TPC Members -- Sponsors -- Preface -- Contents -- About the Editors -- 1 Study Optimization of Thermal Analysis of Anisotropic Materials in 3D Field Based on One-Dimensional Heat Conduction Equation Model -- 1.1 Introduction -- 1.2 Heat Transfer Mode and Process Analysis -- 1.3 Optimization Model of Protective Clothing Design for High-Temperature Engineering Work -- 1.3.1 The Establishment of the Model and the Proposal of the Hypothesis Conditions -- 1.3.2 Optimization Model Based on Inversion Method -- 1.4 Conclusion -- References -- 2 Shape Retrieval for 3D Models Based on MRF -- 2.1 Introduction -- 2.2 Feature Descriptor -- 2.3 Framework of Retrieval -- 2.3.1 Notations -- 2.3.2 Formulation -- 2.3.3 Potential Function -- 2.4 Spatial Consistency Test -- 2.4.1 Training -- 2.4.2 Testing -- 2.4.3 Index Based on Random Forest -- 2.4.4 Measure Similarity -- 2.5 Experiments -- 2.6 Conclusions -- References -- 3 Numerical Conformal Mapping Based on Improved Hermitian and Skew-Hermitian Splitting Method -- 3.1 Introduction -- 3.2 Numerical Conformal Mapping Based on the Charge Simulation Method -- 3.3 Improved HSS Method Based on (k, j)-Padé Iteration Method -- 3.4 Numerical Examples -- 3.5 Conclusions -- References -- 4 Hierarchical Clustering-Based Video Summarization -- 4.1 Introduction -- 4.2 Feature Extraction -- 4.2.1 Color Feature -- 4.2.2 Texture Feature -- 4.3 The Proposed Algorithm -- 4.3.1 Hierarchical Clustering Method -- 4.3.2 Optimize Initial Clustering Results to Extract Video Summary Key Frames -- 4.4 Experimental Results and Discussion -- 4.4.1 Evaluation Standard -- 4.4.2 Experimental Results -- 4.5 Conclusion -- References. , 5 Research on Multi-objective Optimization Problem of Engineering Project in 3D Field Based on Improved Particle Swarm Optimization Algorithm -- 5.1 Introduction -- 5.2 IPSO Algorithms -- 5.3 Model -- 5.4 Engineering Calculation and the Result Analysis -- 5.5 Conclusions -- References -- 6 3D Path Planning Based on Improved Particle Swarm Optimization Algorithm -- 6.1 Introduction -- 6.2 Path Planning Environment Modeling and Fitness Function -- 6.2.1 Environmental Modeling -- 6.2.2 Fitness Function -- 6.3 Improved PSO Algorithm -- 6.3.1 Basic PSO Algorithm -- 6.3.2 BFO Algorithm -- 6.3.3 Hybrid Algorithm -- 6.4 Simulation Verification -- 6.5 Conclusion -- References -- 7 Improving Parallel Magnetic Resonance Imaging Reconstruction Using Nonlinear Time Series Analysis -- 7.1 Introduction -- 7.2 Background -- 7.3 Method -- 7.4 Experimental Results -- 7.5 Conclusion -- References -- 8 Low Computational Complexity Third-Order Tensor Representation Through Inverse Spectrum Pyramid -- 8.1 Introduction -- 8.2 Method for Third-Order Tensor Representation Through 3D Reduced ISP -- 8.2.1 Representation of a Tensor of Size 4 × 4 × 4 -- 8.2.2 Representation of the Tensor of Size N × N × N Through N-Level 3D-RISP -- 8.3 Characteristics of the Spectrum Tensor Representation -- 8.4 Conclusions -- References -- 9 Spectral Reconstruction Based on Bayesian Regulation Neural Network -- 9.1 Introduction -- 9.2 Principle of Spectral Reflectance Reconstruction -- 9.2.1 Polynomial Regression -- 9.2.2 Bayesian Regularization BP Neural Network Algorithm -- 9.3 Experimental Results and Analysis -- 9.3.1 Experiment Process -- 9.3.2 Analysis and Comparison of Results -- 9.4 Conclusion -- References -- 10 Loose Hand Gesture Recognition Using CNN -- 10.1 Introduction -- 10.2 The Proposed Method -- 10.2.1 Training Data Preparation. , 10.2.2 The Proposed Neural Network Architecture -- 10.2.3 Loss Function -- 10.3 Experiments -- 10.3.1 CNN with Input RGB-D Images -- 10.3.2 CNN with Multi-resolution Features -- 10.3.3 Compared with Other Popular CNN Models -- 10.4 Conclusions -- References -- 11 Multi-focus Image Fusion Method Based on NSST and BP Neural Network -- 11.1 Introduction -- 11.2 Image Fusion Method -- 11.2.1 NSST Transformation -- 11.2.2 Feature Extraction and NSST Contrast -- 11.2.3 BP Neural Network Training -- 11.2.4 Algorithm Framework and Steps -- 11.3 Experiments Results -- 11.4 Conclusions -- References -- 12 Classification of 3D Remote Sensing Images Through Dimensionality Reduction and Semantic Segmentation Network -- 12.1 Introduction -- 12.2 Proposed Method -- 12.2.1 The Whole Approach Framework -- 12.2.2 Rasterization -- 12.2.3 Normalization and Hat Transform -- 12.2.4 DSM Post-processing -- 12.2.5 Network for Classification -- 12.3 Experiment -- 12.3.1 Training Deeplabv3+ -- 12.3.2 Post-processing by NDSM -- 12.3.3 Visualization of 3D Remote Sensing Images -- 12.4 Conclusion -- References -- 13 Research on Deep Learning Algorithm and Application Based on Convolutional Neural Network -- 13.1 Introduction -- 13.2 Convolutional Neural Network -- 13.2.1 Local Connection of Convolutional Neural Networks -- 13.2.2 Weight Sharing in Convolutional Neural Networks -- 13.3 The Overall Structure of the Convolutional Neural Network -- 13.4 The Application of Deep Learning Algorithm Based on Convolutional Neural Network -- 13.4.1 Application in the Field of Natural Language Processing -- 13.4.2 Application in the Field of Image Recognition -- 13.4.3 Application in the Field of Speech Recognition -- 13.5 The Conclusion -- References -- 14 Object Attribute Recognition Based on Hard Negative Mining and Convolutional Neural Network -- 14.1 Introduction. , 14.2 Object Location Based on Improved Faster R-CNN Model -- 14.2.1 Hard Negative Mining Strategy -- 14.2.2 OHEM-Faster R-CNN Object Location Model -- 14.3 Object Attribute Recognition Method Based on Improved Cascade Convolution Neural Network Model CS-CNN Model -- 14.3.1 Improved Activation Function and Loss Function -- 14.3.2 Improved CS-CNN Model Object Attribute Recognition Method -- 14.4 Experimental Simulations -- 14.4.1 Model Parameters -- 14.4.2 Experimental Simulations of Object Location -- 14.4.3 Contrastive Experimental Simulations of Object Attribute Recognition -- 14.5 Conclusion -- References -- 15 Research on Intelligent Identification Method of Power Equipment Based on Deep Learning -- 15.1 Introduction -- 15.1.1 Background -- 15.1.2 Purpose and Significance -- 15.1.3 Summary of Research Level at Home and Abroad -- 15.2 Solutions and Key Technologies -- 15.2.1 Power Equipment Image Processing and Feature Extraction -- 15.2.2 Power Equipment Classification -- 15.2.3 Establish a Standardized Image Analysis Library -- 15.3 Conclusion -- References -- 16 Chinese Color Name Identification from Images Using a Convolutional Neural Network -- 16.1 Introduction -- 16.2 Color Vocabulary Labeled Data Set -- 16.3 The Model of Color Recognition -- 16.3.1 Design of Multi-label Convolutional Neural Networks -- 16.3.2 Evaluation Criteria -- 16.3.3 Choosing the Appropriate Threshold -- 16.4 Conclusion -- References -- 17 Research and Design of a Key Technology for Accelerating Convolution Computation for FPGA-Based CNN -- 17.1 Introduction to Relevant Theories -- 17.1.1 Introduction to Convolution Neural Network -- 17.1.2 The Training Process -- 17.2 SpNet Model -- 17.3 Research on Correlation Algorithm Research -- 17.3.1 Im2col Algorithm -- 17.3.2 Strassen Algorithm -- 17.3.3 Improved Strassen Algorithm. , 17.4 An Accelerated Convolution Calculation Scheme Based on FPGA -- 17.4.1 Design of Training Architecture of Convolutional Neural Network Based on FPGA -- 17.4.2 Design and Implementation of Convolution Computing Module -- 17.4.3 Testing the Convolutional Neural Network -- 17.5 Summary -- References -- 18 Research on Voice Mark Recognition Algorithms Based on Optimized BP Neural Network -- 18.1 Introduction -- 18.2 Wavelet Transform of Voice Signal -- 18.3 Basic Conception of BP-GA -- 18.3.1 Construction of BP Neural Network VoicePrint Recognition -- 18.4 Design of Genetic Algorithm -- 18.5 Simulation Analyses of an Example with BP-GA Algorithm -- 18.6 Conclusions -- References -- 19 Single Image Super Resolution via Deep Convolutional Dual Upscaling Branches with Different Focus -- 19.1 Introduction -- 19.2 Related Works -- 19.2.1 Variant Shortcuts -- 19.2.2 Skillfully Nesting Modules -- 19.3 Proposed Method -- 19.3.1 The Entire Structure -- 19.3.2 Residual Learning Branch -- 19.3.3 Planar Component Branch -- 19.3.4 Mathematical Formulation -- 19.4 Experimental Results -- 19.4.1 Datasets -- 19.4.2 Parameters Settings -- 19.4.3 Results and Comparisons -- 19.4.4 Ablation Analysis -- 19.5 Conclusions -- References -- 20 Human Heart Model Rendering Based on BRDF Algorithm -- 20.1 Introduction -- 20.2 Theoretical Research and Experimental Methods -- 20.2.1 Theoretical Research -- 20.2.2 Experimental Method -- 20.3 Experimental Results -- 20.3.1 Experimental Conditions -- 20.3.2 Rendering Results and Analysis -- 20.4 Conclusions and Discussion -- References -- 21 Level Set Segmentation Algorithm for Cyst Images with Intensity Inhomogeneity -- 21.1 Introduction -- 21.2 C-V Model -- 21.3 Improved C-V Level Set Model -- 21.3.1 Local Information -- 21.3.2 Speed Function -- 21.3.3 Overall Energy Functional -- 21.4 Experimental Results and Analysis. , 21.5 Conclusion.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (856 pages)
    Edition: 1st ed.
    ISBN: 9783030343873
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1084
    DDC: 006.3
    Language: English
    Note: Intro -- 4th International Conference on Intelligent and Interactive Systems and Applications (IISA2019) -- Editorial -- Acknowledgements -- Contents -- Intelligent Systems -- Recognition of Voiceprint Using Deep Neural Network Combined with Support Vector Machine -- Abstract -- 1 Introduction -- 2 Methods -- 3 Voiceprint Recognition Based on DBN-SVM -- 3.1 Experimental Procedures and Processes -- 3.2 Corpus Description and MFCC Extraction -- 3.3 DBN Training and Deep Feature Extraction -- 3.4 Experimental Result and Analysis -- 4 Conclusion -- Acknowledgments -- References -- Research on Intelligent Patent Classification Scheme Based on Title Analysis -- Abstract -- 1 Introduction -- 2 Topic-Based Patent Classification Scheme -- 2.1 The Process of Topic-Based Patent Classification Scheme -- 2.2 Results and Discussion -- 3 Title Word-Frequency-Based Patent Classification Scheme -- 3.1 The Process of Title Word-Frequency-based Patent Classification Scheme -- 3.2 Results and Discussion -- 4 Conclusions -- References -- Study on Intelligent Recognition Matching and Fusion Interaction Technology of Electrical Equipment Model -- Abstract -- 1 Introduction -- 1.1 Background -- 1.2 Purpose and Significance -- 1.3 Overseas Research Levels -- 1.4 Domestic Research Levels -- 2 Solutions and Key Technologies -- 2.1 Power Equipment Model Identification -- 2.2 Panoramic Model and Background Real-Time Monitoring Data Fusion Interaction -- 2.3 Physical Device Model Overlay and Virtual Integration -- 2.4 Model Control Interaction -- 3 Conclusion -- Acknowledgments -- References -- Deep Knowledge Tracing Based on Bayesian Neural Network -- Abstract -- 1 Introduction -- 2 Related Works -- 3 BDKT -- 3.1 BDKT Input Data -- 3.2 BDKT Model Structure -- 3.3 BDKT Parameter Learning -- 4 Results and Discussion -- 4.1 BDKT Vs DKT. , 4.2 BDKT Parameter Randomness and Model Uncertainty -- 4.3 Relationship Between the Students' Behaviors -- 5 Conclusion -- Acknowledgment -- References -- Co-simulation of Sub-frame of the Intelligent Fire Truck Based on SolidWorks and ANSYS Workbench -- Abstract -- 1 Introduction -- 2 Main Technical Difficulties -- 2.1 The Connection Problem -- 2.2 Contact Settings -- 2.3 Meshing -- 3 Load Loading -- 4 Simulation Results -- 4.1 Static Simulation Without Impact Force -- 4.2 Static Simulation with Impact Force -- 4.3 Modal Analysis of the Overall Structure -- 5 Conclusion -- Acknowledgments -- References -- Design of Framework on Intelligent Simulation and Test Platform for High Power Microwave Sources -- Abstract -- 1 Introduction -- 2 Requirement Analyses -- 2.1 User Requirements -- 2.2 Functional Requirements -- 2.3 Interface Requirements -- 3 Frame Design -- 3.1 Development Language Selection -- 3.2 Design Model -- 3.3 Design Method -- 3.4 Computing Model -- 4 Technical Support -- Acknowledgments -- References -- Design of Intelligent Meter Life Cycle Management System Based on RFID -- Abstract -- 1 Introduction -- 2 Anti-collision Algorithm Processing of RFID Signal -- 3 Composition of the Life Cycle Management System -- 3.1 Cloud Platform Management System -- 3.2 RFID Intelligent Meter Storage System -- 3.3 RFID Smart Meter On-Site Data Copying System -- 4 Design of RFID Electronic Tag Antenna -- 5 Conclusion -- Acknowledgements -- References -- Design of Single-Phase Intelligent Meter Based on RFID Semi Active Technology -- Abstract -- 1 Introduction -- 2 Overall Design of Smart Meter -- 3 Hardware Design of Smart Meter -- 3.1 CPU Module -- 3.2 Metering Module -- 3.3 Communication Module -- 3.4 Clock and Storage Module -- 4 Software Design -- 4.1 Overall Structure of the Software -- 4.2 RFID Interface Design Based on Three-Tier Architecture. , 5 System Debugging -- 6 Conclusion -- Acknowledgements -- References -- Research on Anti-fall Algorithms of Substation Intelligent Inspection Robot -- Abstract -- 1 Introduction -- 2 Design of Inspection Platform -- 3 Ranging Principle of Binocular Camera -- 4 Application Principle of Anti-falling -- 5 Design and Analysis of Algorithms -- 6 Conclusion -- References -- Research and Application of Process Object Modeling Method Based on Deep Learning -- Abstract -- 1 Introduction -- 2 DNN Deep Learning Algorithms -- 3 Modeling of DNN Deep Learning Network -- 3.1 Open-Loop Modeling Method Based on Multiple Inertial Filters -- 3.2 Closed-Loop Modeling Method Based on Two DNN Models -- 4 Conclusion -- References -- Performance Assessment of Smart Electricity Meters Based on Max Margin Bayesian Classifiers -- Abstract -- 1 Introduction -- 2 Methodology -- 2.1 Feature Selection Based on Genetic Algorithm -- 2.2 Learning Max-Margin Bayesian Classifiers Based on Bagging Ensemble -- 2.3 Selecting Max Margin Bayesian Classifiers Subset Based on Clustering Algorithm -- 3 Experimental Results and Analysis -- 4 Conclusions and Future Works -- References -- Operating Performance Assessment of Smart Meters Based on Bayesian Networks and Convex Evidence Theory -- Abstract -- 1 Introduction -- 2 The Proposed Methodology -- 2.1 Discretization -- 2.2 Training of Bayesian Networks from Historical Data of Smart Electricity Meters -- 2.3 Using the Convex Evidence Theory to Integrate the Assessment Results of Bayesian Networks -- 3 Experimental Results and Analysis -- 4 Conclusions and Future Works -- Acknowledgments -- References -- Research on Object-Oriented Design Defect Detection Method Based on Machine Learning -- Abstract -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 2 Software Design Defects -- 2.1 Related Concepts -- 2.2 Related Definition. , 3 Design Defect Detection Method -- 3.1 Design Defect Detection -- 3.2 Feature Extraction -- 3.3 Design Defect Classifier Algorithms -- 3.4 Design Defect Detection Algorithms -- 4 Experiment and Evaluation -- 4.1 Experiment -- 4.2 Result Analysis -- Acknowledgments -- References -- Design of Electromagnetic Energy-Saving Intelligent Vehicle -- Abstract -- 1 Introduction -- 2 Principles of Operation -- 3 Test Results -- 4 Conclusion -- Acknowledgments -- References -- New Energy Vehicle Reliability Research by Large Data -- Abstract -- 1 Introduction -- 2 Reliability Analysis Theory -- 3 Acquisition of Automobile Fault Data -- 4 Calculation of Equivalent Fault Number Change Curve of Automobile in Different Mileage Ranges -- 4.1 Establishing the Curve of Vehicle Type Changing with the Number of Mileage Faults -- 4.2 Classification of Fault Hazard Degree -- 4.3 Calculation of Equivalent Fault Number Change Curve of Automobile in Different Mileage Ranges -- 5 Calculation of Reliability Evaluation Index of Vehicle Type -- 6 Establishment of Comprehensive Evaluation Model of Vehicle Type Reliability -- 7 Conclusion -- References -- One-Step Prediction for GM(1,1) with a Sliding Data Window -- Abstract -- 1 Introduction -- 2 The GM(1,1) Model -- 3 Introducing the Sliding Data Window to GM(1,1) -- 4 The Requirements of Data Samples for GM(1,1) -- 5 Experimental Results -- 6 Conclusions -- Acknowledgement -- References -- Evaluation on Well-Canal Combined Irrigation Modes for Cotton Fields in the South of Xinjiang, China Based on an Algorithm of Fuzzy Neutral Network -- Abstract -- 1 Background -- 2 Flow and Steps of the Algorithm -- 2.1 Flow of Algorithm for Fuzzy Neural Network -- 2.2 Steps of the Algorithm -- 3 Mathematical Principles of the Algorithm -- 3.1 Principles of Fuzzy Mathematics and FNN -- 3.2 Fuzzy Function and FNN -- 4 Empirical Analysis. , 4.1 Prediction Image of Training Data Based on FNN Algorithm -- 4.2 Results -- 5 Conclusions -- Acknowledgements -- References -- Grape Downy Mildew On-line Detection Based on Accurate Image Processing Method Preformed on Embedded Ambient Intelligence System -- Abstract -- 1 Introduction -- 2 Intelligent Image Processing -- 2.1 Holistic Methods Organization Chart -- 2.2 Image Processing -- 2.3 Decrease of Disturbance of Leaf Vein -- 3 System Design -- 4 GDM Diagnose, Grading and Preventive Measures -- 5 Conclusion -- Acknowledgments -- References -- An Improved Bisecting K-Means Text Clustering Method -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Data Processing -- 3.1 Corpus Acquisition -- 3.2 Data Extraction Using Word2Vec -- 3.3 Using TF-IDF to Select Feature Word Vector -- 4 The Improved Bisecting K-Means Text Clustering Method -- 4.1 Bisecting K-Means Clustering -- 4.2 Improved Bisecting K-Means Algorithm -- 5 Experimental Results Analysis -- 5.1 Experimental Process -- 5.2 Experimental Results -- 6 Conclusion -- Acknowledgements -- References -- PLC-Based Control System Design of Intelligent and Efficient Multiple Parking Device -- Abstract -- 1 Introduction -- 2 Structure and Principle of Intelligent and High Efficiency Multiple Parking Device -- 3 Design of Control System -- 4 Design of System Hardware -- 5 Design of System Software -- 5.1 The Initialization of System -- 5.2 The Procedure of Storage Car -- 5.3 The Rotation of Motor -- 6 Conclusion -- Acknowledgement -- References -- Sparse Acceleration Algorithm Based on Likelihood Upper Bound -- Abstract -- 1 Introduction -- 2 Acceleration Based on Likelihood Upper Bound Filtering -- 2.1 Sparse Expression Target Tracking -- 2.2 Observation Likelihood Upper Bound -- 2.3 Bounded Particle Resampling -- 3 Experimental Results and Analysis -- 3.1 Experimental Data and Algorithm Description. , 3.2 Evaluation Criteria.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Information technology -- Congresses. ; Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (858 pages)
    Edition: 1st ed.
    ISBN: 9788132217596
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.255
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- Part ISignal and Image Processing -- 1 The PSF Measurement for Motion-Blurred Image Based on Analyzing the Frequency Spectrum -- Abstract -- 1…Introduction -- 2…Theoretical Analysis -- 2.1 The Relationship Between the PSF and Blurred Image Spectrum -- 2.2 Snake Model -- 2.3 Hough Transform in Polar Coordinate -- 3…The Point Spread Function Measurement for Motion-Blurred Image -- 3.1 The Steps for Solving Point Spread Function -- 3.2 Analysis of Experimental Results -- 4…Conclusion -- References -- 2 EBR Analysis of Digital Image Watermarking -- Abstract -- 1…Introduction -- 2…Watermarking Communication Model -- 3…Analysis of Watermarking Channel -- 4…Payload Capacity and EBR of Watermark Detection -- 5…Conclusions -- Acknowledgments -- References -- 3 Image Descriptors Based on Statistical Thermodynamics and Applications -- Abstract -- 1…Introduction -- 2…Research Ideas and the Main Content -- 2.1 Image Descriptor -- 2.2 Image Descriptor: Image Energy -- 2.3 Image Descriptor: Image Mass -- 2.4 Image Descriptor: Image Pressure -- 2.5 Image Descriptor: Image Temperature -- 3…Experiments and Analysis -- 3.1 Description of the Digital Image -- 3.2 Clustering Applications -- 3.3 Content-Based Image Retrieval -- 4…Conclusions -- Acknowledgments -- References -- 4 A Novel Image Retrieval Method Based on Fractal Code and Fuzzy Set -- Abstract -- 1…Introduction -- 2…Fractal Coding -- 3…Fuzzy Set Measure -- 3.1 Fuzzy Classifier -- 3.2 Proposed Algorithm -- 4…Similarity Measure -- 5…Experiment -- 6…Conclusion -- References -- 5 Velocity Evaluation in Traffic Accidents Occurred at the Road Intersection Based on Image Processing -- Abstract -- 1…Introduction -- 2…Algorithm Principle -- 3…Main Steps of Algorithm -- 3.1 Obtain Frame Sequences -- 3.2 Accurate Velocity of the Vehicle Calculation. , 3.3 Range Velocity of the Vehicle Calculation -- 4…Conclusion -- References -- 6 A Hybrid Method for Extracting Liver from 3D CT Image -- Abstract -- 1…Introduction -- 2…Related Research -- 3…Proposed Method -- 3.1 Three-Dimensional Region-Growing Algorithm -- 3.2 Image Morphology -- 4…Experimental Results -- 5…Summary -- References -- 7 A New Image-Fusion Technique Based on Blocked Sparse Representation -- Abstract -- 1…Introduction -- 2…Sparse-Coding Model -- 2.1 Selection of the Dictionary -- 2.2 Sparse Coding of Signals -- 3…Proposed Fusion Scheme -- 3.1 Fusion Framework Based on Sparse Coding -- 3.2 Fusion Rule -- 4…Experimental Results -- 5…Conclusion -- Acknowledgments -- References -- 8 The Studying of the Restoration of Defocused Images -- Abstract -- 1…Introduction -- 2…Disk Defocus Model -- 3…Gauss Defocus Model -- 4…Improved Defocus Model -- 5…Conclusion -- References -- 9 High-Order Total Variation-Based Image Restoration with Spatially Adapted Parameter Selection -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Implementation Details -- 4…Numerical Experiments -- Acknowledgments -- References -- 10 Research of Vehicle Identification Based on Adaptive Corner Detection -- Abstract -- 1…Introduction -- 2…Adaptive Harris Corner Detection -- 2.1 Harris Corner Detection Principle -- 2.2 Adaptive Harris Corner Detection Algorithm -- 3…Vehicle Classification and Recognition -- 3.1 Vehicle Matching Based on Hausdorff Distance -- 3.2 Experimental simulation and analysis -- 4…Conclusion -- References -- 11 Knowledge-Aided Bayesian Optimum Radar Detector -- Abstract -- 1…Introduction -- 2…Bayesian Optimum Radar Detector -- 3…Estimation Method for Detector Priori Distribution Parameter -- 3.1 PDF Fit-Based Method -- 3.2 Method of Fractional Moment -- 3.3 Method Based on Maximal Likelihood Estimation. , 4…KA-BORD Algorithm Performance Analysis -- 4.1 Algorithm Performance Analysis Based on Computer Simulation Data -- 4.2 Algorithm Performance Analysis Based on Sea-Clutter-Measured Data -- 5…Conclusion -- References -- Part IIComputer Security -- 12 An Improvement of an Identity-Based Key-insulated Signcryption -- Abstract -- 1…Introduction -- 2…Analysis of the Chen et al.'s Scheme -- 2.1 Review of the Chen et al.'s Scheme -- 2.2 Analysis -- 3…An Improved Scheme -- 3.1 Security Proof -- 4…Conclusion -- Acknowledgments -- References -- 13 Stability Analysis of a Rapid Scanning Worm Propagation Model with Quarantine Strategy -- Abstract -- 1…Introduction -- 2…Mathematical Model Formulation -- 3…The Stability Analysis for Equilibriums -- 3.1 Worm-Free Equilibrium and Its Stability -- 3.2 Endemic Equilibrium and Its Stability -- 4…Numerical Simulations -- 5…Conclusions -- Acknowledgments -- References -- 14 A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Abstract -- 1…Introduction -- 2…Architecture -- 3…Normal System Behavior Profiling -- 4…Anomaly Detection Algorithm -- 5…Simulations and Results -- Acknowledgments -- References -- 15 Trusted Network Access Authentication Scheme Based on the Label -- Abstract -- 1…Introduction -- 2…Summary of the Trusted Networks -- 3…Trusted Network Access Authentication Scheme Based on the Label -- 3.1 Scene Setting -- 3.2 Trusted Label -- 3.3 Access Authentication -- 4…Security Analysis -- 5…Conclusion -- References -- 16 A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms -- Abstract -- 1…Introduction -- 2…System Architecture -- 3…Authentication Process -- 3.1 Mobile User Registration -- 3.2 Authentication -- 3.3 Mobile User Unregistration -- 4…Scheme Analyze -- 4.1 Security Analyze -- 4.2 Performance Analysis -- 5…Conclusion -- Acknowledgments -- References. , 17 Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- Abstract -- 1…Introduction -- 2…Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- 2.1 Detecting Suspicious Neighbors -- 2.2 Looking for Abnormal Topology -- 2.3 Isolating False Neighbors -- 3…Simulation and Performance Analysis -- 4…Conclusion -- Acknowledgments -- References -- 18 Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Wormhole Path-Tracking Algorithm Based on Detecting Nodes -- 2.1 The Specific Detection Algorithm Structuring -- 3…The Simulation -- 4…Conclusion -- Acknowledgments -- References -- 19 Ad hoc Eavesdropping Algorithm-Based Network Coding -- Abstract -- 1…Introduction and Related Research -- 2…Ad hoc Hacking Attack Resistance of Secure Network Coding -- 2.1 Network Model -- 2.2 Attack Model -- 2.3 Algorithm Ideas -- 2.4 Algorithm Ideas -- 3…Secure Proof -- 4…Communication Overhead -- 5…Conclusion and Outlook -- Acknowledgments -- References -- 20 Improved Halftone Visual Cryptography by Random Grids -- Abstract -- 1…Introduction -- 2…The Proposed Schemes -- 2.1 Random Position Selection -- 2.2 Homogeneous Distribution of SIPs -- 2.3 Generation of Halftone Shares -- 3…Simulation Results and Discussions -- 4…Discussions -- 5…Conclusions -- References -- 21 Statistical Tests for Combined Secret Key Sequence -- Abstract -- 1…Introduction -- 2…Binary Sequence Generation for Test -- 2.1 Combined Secret Key Generation -- 2.2 Generate and Save the Binary Sequence -- 3…Statistical Test and Assessment for CSK Sequences -- 3.1 Frequency (Monobit) Test -- 3.2 Runs Test -- 3.3 Serial Test -- 4…Conclusions -- Acknowledgments -- References -- Part IIICommunication and Networking -- 22 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- Abstract. , 1…Introduction -- 2…The Return Communication System -- 2.1 The Basic Frame of Method -- 2.2 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- 2.3 Data Interaction Process of System -- 3…The Design and Implementation of Core Modules -- 3.1 Terminal Node -- 3.2 Gateway -- 3.3 Mobile Node (Mobile) -- 4…Conclusions -- References -- 23 A Study of Smart Grid Communication Architecture -- Abstract -- 1…Introduction -- 2…SG Communications Requirements -- 3…SGICA -- 4…Information and Communication Technologies for SGICA -- 5…IP-Based Communications for SG -- 6…Summary -- Acknowledgments -- References -- 24 Green Router: Power-Efficient Router Design -- Abstract -- 1…Introduction -- 2…Architectural Design -- 3…Operation Mechanism -- 3.1 Dynamic Sleep and Wakeup -- 3.2 Dispatching Policy -- 4…Modeling and Evaluation -- 4.1 Modeling -- 4.2 Experiment and Evaluation -- 5…Conclusion -- References -- 25 Design and Implementation of Web Service for Scenario Data Service System in War Gaming -- Abstract -- 1…Introduction -- 2…Approach of Technology -- 3…Architecture of the System -- 4…Design and Implementation of Web Layer -- 4.1 Web Service Design -- 4.2 Index Service Design -- 5…Conclusion -- Acknowledgments -- References -- 26 Gateway of Internet of Things for Intelligent Warehouse Management System Based on Embedded Web Server -- Abstract -- 1…Introduction -- 2…Use Scenario and Functional Requirements of IOTGW -- 2.1 IOT Architecture of Intelligent Warehouse Management System -- 2.2 Functional Requirements of IOT Gateway -- 3…Design of Multiprotocol IOT-Gateway Based on Embedded Web Server -- 3.1 Design Elements and Principles -- 3.2 Architecture of Hardware and Software -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 27 Research of Wireless Transmission Strategy for High-Speed Railway -- Abstract -- 1…Introduction. , 2…Research Environment and Content.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Data mining. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (172 pages)
    Edition: 1st ed.
    ISBN: 9789811037795
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.555
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- About the Book -- Contents -- About the Editors -- 1 Research on SaaS-Based Mine Emergency Rescue Preplan and Case Management System -- Abstract -- 1 Introduction -- 2 SaaS and Service-Oriented Architecture -- 3 The Architecture of System -- 4 The Components of System -- 5 System Implementation and Testing -- 6 Conclusion -- Acknowledgements -- References -- 2 An Investigation of Matching Approaches in Fingerprints Identification -- Abstract -- 1 Introduction -- 2 Research Method -- 2.1 Research Questions -- 2.2 Research Strategies -- 3 Fingerprints Matching Approaches -- 3.1 Taxonomy of the Study -- 3.2 Generic Process of Three Main Types of Fingerprints Matching -- 4 Current Issues of the Matching Approaches -- Acknowledgements -- References -- 3 Figure Plagiarism Detection Using Content-Based Features -- Abstract -- 1 Introduction -- 2 Content-Based Feature Extraction -- 3 Similarity Detection -- 4 Result and Evaluation -- 5 Conclusions -- Acknowledgements -- References -- 4 An Efficient Content-Based Image Retrieval (CBIR) Using GLCM for Feature Extraction -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Preprocessing Phase -- 2.2 Feature Extraction Phase -- 3 Methodology -- 4 Similarity Feature Extraction -- 5 Algorithm for GLCM -- 6 Results and Discussion -- 7 Comparative Analysis -- 8 Conclusions -- References -- 5 Emotion Recognition System Based on Facial Expressions Using SVM -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Emotion Recognition -- 3.1 Image Preprocessing -- 3.2 Feature Extraction -- 3.3 Feature Selection -- 3.4 Expression Recognition -- 3.5 Experiments Results -- 4 Conclusion -- References -- 6 An AES-CHAOS-Based Hybrid Approach to Encrypt Multiple Images -- Abstract -- 1 Introduction -- 1.1 Fast Chaotic Algorithm -- 1.2 AES Image Encryption -- 1.3 Cramer's Rule. , 2 Literature Review -- 3 Proposed Algorithm -- 4 Results -- 5 Conclusion -- References -- 7 Automatic Text Summarization of Video Lectures Using Subtitles -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Proposed Architecture -- 2.1.1 Data Preprocessing -- 2.1.2 Feature Selection for Summarization -- 2.1.3 Processing After Feature Selection for Summarization -- 3 Conclusion -- References -- 8 Classification of EMG Signals Using ANFIS for the Detection of Neuromuscular Disorders -- Abstract -- 1 Introduction -- 2 Proposed Model -- 2.1 Preprocessing of the EMG Signal -- 2.2 Processing or Feature Extraction of EMG Signal -- 2.3 Classification of EMG Signal -- 3 Results and Analysis -- 4 Conclusion -- References -- 9 Evaluating Similarity of Websites Using Genetic Algorithm for Web Design Reorganisation -- Abstract -- 1 Introduction -- 2 Web Mining-A Background -- 2.1 Web Mining Taxonomy -- 2.2 Web Mining Tasks -- 3 Literature Survey -- 4 Proposed Methodology -- 5 Experimental Evaluation -- 5.1 Proposed Genetic Algorithm -- 5.2 Computation of Similarity -- 6 Conclusion -- References -- 10 Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System -- Abstract -- 1 Introduction -- 2 Proposed Hybrid Intrusion Detection Methodology -- 2.1 Feature Preparation Module -- 2.2 Misuse Analyzer Module -- 2.3 Anomaly Analyzer Module -- 3 Simulation Results -- 4 Conclusion -- References -- 11 Analysis of Reconfigurable Fabric Architecture with Cryptographic Application Using Hashing Techniques -- Abstract -- 1 Introduction -- 2 Methodology -- 3 Implementation of Reconfigurable Fabric -- 4 Interconnect Topologies -- 5 Operation -- 6 Results -- 6.1 Hashing Function -- 7 Conclusion -- References -- 12 Privacy Preservation of Infrequent Itemsets Mining Using GA Approach -- Abstract -- 1 Introduction. , 2 Literature Survey -- 3 Problem Definition -- 4 Proposed Framework -- 5 Proposed Algorithm -- 5.1 Illustrated Example -- 6 Result Analysis -- 7 Conclusion -- References -- 13 A Quinphone-Based Context-Dependent Acoustic Modeling for LVCSR -- Abstract -- 1 Introduction -- 2 Working of ASR -- 3 Phonetic Representation of Speech Signals -- 3.1 Modeling Using Monophones -- 3.2 Modeling Using Triphones -- 3.3 Modeling Using Quinphones -- 4 Implementation -- 4.1 Speech Data Preparation -- 4.2 Training -- 4.3 ASR Performance Analysis -- 5 Experiments -- 5.1 Testing with Varying Vocabulary Sizes -- 5.2 Testing with Varying Gaussian Mixtures -- 6 Conclusion -- References -- 14 Slot-Loaded Microstrip Antenna: A Possible Solution for Wide Banding and Attaining Low Cross-Polarization -- Abstract -- 1 Introduction -- 2 Theoretical Background -- 3 Proposed Structure -- 4 Results and Discussions -- 5 Conclusions -- Acknowledgements -- References -- 15 Fractal PKC-Based Key Management Scheme for Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 System Model -- 3.2 Fractal-based Key Pair Generation and Key Exchange -- 4 Fractal PKC-based Key Management Scheme: FPKM -- 4.1 Set-up Phase -- 4.2 Clustering Phase -- 4.3 Rekeying Phase -- 5 The Performance Evaluation of Proposed Scheme -- 6 Conclusion -- References -- 16 Histogram-Based Human Segmentation Technique for Infrared Images -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 2.1 Selection of ROIs -- 2.2 Human Candidates Segmentation -- 3 Experiment Results -- 4 Conclusion -- References -- 17 Medical Image Segmentation Based on Beta Mixture Distribution for Effective Identification of Lesions -- Abstract -- 1 Introduction -- 2 Probability Distribution Functions of Beta Mixture Model Using the EM Algorithm -- 3 Clustering Algorithm Based on Fuzzy c-Means. , 4 Dataset -- 5 Segmentation Algorithm -- 5.1 Experimentation -- 6 Results Derived and Performance Analysis -- 7 Conclusion -- References -- 18 Toward Segmentation of Images Based on Non-Normal Mixture Models Based on Bivariate Skew Distribution -- Abstract -- 1 Introduction -- 2 Bivariate Skew Gaussian Mixture Model -- 3 k-Means Algorithm -- 4 Data Set Considered -- 5 Feature Selection -- 6 Experiment Result and Performance Evolution -- 7 Conclusion -- References -- 19 Development of Video Surveillance System in All-Black Environment Based on Infrared Laser Light -- Abstract -- 1 Introduction -- 2 Design of Video Capture System -- 2.1 IR Laser Aiding Light Module -- 2.2 Photoelectric Sensor Module -- 2.3 Central Control Module -- 3 System Testing -- 4 Conclusion -- Acknowledgements -- References -- 20 Data Preprocessing Techniques for Research Performance Analysis -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Business Intelligence -- 2.2 Data Preprocessing -- 3 Research Performance Analysis -- 3.1 Data Preprocessing Approach -- 4 Conclusion -- Acknowledgements -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (834 pages)
    Edition: 1st ed.
    ISBN: 9789811559716
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.194
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Intelligent and Cloud Computing -- M-Throttled: Dynamic Load Balancing Algorithm for Cloud Computing -- 1 Introduction -- 2 Literature Survey -- 3 Existing Algorithms -- 3.1 Throttled Load Balancing -- 3.2 Round-Robin Load Balancing -- 3.3 SJF Load Balancing -- 4 Proposed Algorithm: M-throttled -- 5 Implementation -- 6 Conclusion -- References -- iGateLink: A Gateway Library for Linking IoT, Edge, Fog, and Cloud Computing Environments -- 1 Introduction -- 2 Related Work -- 3 System Model and Architecture -- 3.1 Implementation Details -- 4 Case Studies -- 5 Conclusions and Future Work -- References -- Hetero Leach: Leach Protocol with Heterogeneous Energy Constraint -- 1 Introduction -- 2 Routing Algorithm -- 2.1 LEACH -- 2.2 Hetero Leach -- 3 Simulation and Result -- 4 Conclusion -- References -- A Semantic Matchmaking Technique for Cloud Service Discovery and Selection Using Ontology Based on Service-Oriented Architecture -- 1 Introduction -- 2 Service-Oriented Computing -- 2.1 Service-Oriented Architecture -- 3 Proposed Model -- 3.1 Client Request -- 3.2 Cloud Service Discovery -- 3.3 Cloud Service Selection -- 3.4 Cloud Ontology Triple Store -- 4 Proposed Matchmaking Technique -- 5 Conclusion and Future Work -- References -- An Intelligent Approach to Detect Cracks on a Surface in an Image -- 1 Introduction -- 2 Literature Review -- 3 Min-Max Gray Level Discrimination Method -- 4 Proposed Model for Crack Detection -- 5 Conclusion -- References -- A Study of Machine Learning Techniques in Short Term Load Forecasting Using ANN -- 1 Introduction -- 2 ANN in STLF -- 2.1 Multilayer Perceptron Network (MLP) -- 2.2 Learning -- 2.3 Generalization -- 2.4 MLP Organizes in Burden Estimating -- 3 Proposed Work -- 3.1 Back Propagation (BP) by ANN -- 3.2 Fuzzy Logic by ANN. , 3.3 Hereditary Calculation (HC) by ANN -- 3.4 Particle Swarm Optimization (PSO) by ANN -- 4 Conclusion -- References -- A Review for the Development of ANN Based Solar Radiation Estimation Models -- 1 Introduction -- 2 Basics of Artificial Neural Network (ANN) -- 3 ANN for Solar Radiation Estimation -- 4 Review of Global Radiation Estimation Using ANN -- 5 Comparative Study of All the Models -- 6 Identified Research Gap in Solar Radiation Estimation -- 7 Conclusion -- References -- Analysis and Study of Solar Radiation Using Artificial Neural Networks -- 1 Introduction -- 2 ANN Fundamentals -- 2.1 What is ANN? -- 2.2 Nodal Configuration -- 2.3 ANN Types -- 2.4 Learning Stuff -- 3 ANN Working Principle and Architecture -- 3.1 Introduction -- 4 Applications, Advantages, and Disadvantages -- 4.1 Applications -- 4.2 Advantages -- 4.3 Disadvantages -- 5 Methodology -- 5.1 ANN for Predicting Solar Radiation -- 5.2 Data Considered -- 5.3 Operating Stages -- 5.4 Performance -- 6 Comparison Between ANN-Based and Existing Modeling -- 7 Conclusion -- References -- A Scheme to Enhance the Security and Efficiency of MQTT Protocol -- 1 Introduction -- 2 Literature Review -- 2.1 Security Requirements of IoT -- 2.2 Privacy Concerns in IoT -- 2.3 MQ Telemetry Transport (MQTT) -- 2.4 Architecture of MQTT -- 2.5 MQTT Quality of Service -- 2.6 Security Issues with MQTT -- 2.7 Hash Functions and Digital Signatures -- 2.8 Channel Encryption -- 2.9 Summary of Findings -- 2.10 Problem Statement -- 3 Proposed Scheme -- 3.1 Registration Process -- 4 Result and Discussions -- 5 Conclusions -- References -- Software Fault Prediction Using Random Forests -- 1 Introduction -- 1.1 Random Forests (RF) -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Datasets -- 3.2 Evaluation Criteria -- 4 Implementation and Results -- 5 Conclusion -- References. , A Power Optimization Technique for WSN with the Help of Hybrid Meta-heuristic Algorithm Targeting Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution Methodology -- 3.1 Design Efficient WSN Nodes -- 3.2 Clusterization of the Target Area -- 3.3 Deployment of WSN Nodes Using Spiral Pattern WSN Node Deployment Policy -- 4 Numerical Result Analysis -- 5 Conclusion and Future Work -- References -- A Model for Probabilistic Prediction of Paddy Crop Disease Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Paddy Crop Disease Classification -- 3.1 Brown Spot -- 3.2 Bacterial Leaf Blight -- 3.3 Leaf Smut -- 4 Implementation of the Model -- 4.1 Image Generation and Augmentation -- 4.2 Convolution Steps -- 4.3 Pooling Step -- 4.4 Fully Connected Layers -- 4.5 Disease Prediction -- 4.6 Process Flow Model -- 5 Algorithm of the Model -- 6 Experimental Results -- 7 Conclusions and Future Work -- References -- A Hybridized ELM-Elitism-Based Self-Adaptive Multi-Population Jaya Model for Currency Forecasting -- 1 Introduction -- 2 Methodology Adopted -- 2.1 ELM -- 2.2 Jaya -- 3 Dataset Description -- 4 Experimental Analysis -- 4.1 Abstract View of the Proposed Model -- 4.2 Proposed ELM-ESAMPJ Algorithm for Exchange Rate Analysis -- 4.3 Result Analysis -- 5 Discussions -- 6 Conclusion and Future Work -- References -- A Fruit Fly Optimization-Based Extreme Learning Machine for Biomedical Data Classification -- 1 Introduction -- 2 Machine Learning Techniques for Biomedical Data Classification -- 2.1 Extreme Learning Machine (ELM) -- 2.2 Fruit Fly Optimization (FFO) -- 2.3 The Proposed FFO-ELM Models -- 3 Result and Discussion -- 3.1 Data Description -- 3.2 Performance Evaluation -- 3.3 Result Analysis -- 4 Conclusion -- References -- Partial Reconfiguration Feature in Crypto Algorithm for Cloud Application. , 1 Introduction -- 2 Generations of Crypto Core -- 3 State of the Art -- 4 Architecture and Implementation -- 4.1 Low Processing Platform (LP) -- 4.2 Fog -- 4.3 Cloud -- 5 Conclusion -- References -- Proactive Content Caching for Streaming over Information-Centric Network -- 1 Introduction -- 2 System Model -- 3 Proposed Solution -- 3.1 Content Store (CS) -- 3.2 Ant Colony Process -- 4 Experimental Results -- 5 Conclusion -- References -- Performance Analysis of ERWCA-Based FLANN Model for Exchange Rate Forecasting -- 1 Introduction -- 2 Methodology -- 2.1 FLANN Model -- 2.2 Evaporation Rate-Based Water Cycle Algorithm (ERWCA) -- 2.3 FLANN/ERWCA Model -- 3 Simulation Study -- 4 Conclusion -- References -- Multi-document Summarization Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Experiment and Results Analysis -- 5 Conclusion -- References -- A Convolutional Neural Network Framework for Brain Tumor Classification -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Input Image -- 3.2 Convolution Layer -- 3.3 Pooling Layer -- 3.4 Fully Connected Layer -- 3.5 Output Layer -- 4 Experimental Setup and Results -- 4.1 Dataset Description -- 4.2 Initial Kernel Weights -- 4.3 Activation Function -- 4.4 Loss Function Computation -- 4.5 Training -- 4.6 Model Parameters -- 4.7 Simulation Results -- 5 Conclusion -- References -- Load Balancing in Cloud Computing Environment Using CloudSim -- 1 Introduction -- 2 Related Work -- 3 Objective of Load Balancing in Cloud Computing -- 4 Necessity of Load Balancing -- 5 Verification of Load Balancing Using Cloud Simulator -- 5.1 Various Features of CloudSim Tool -- 5.2 Primary Elements of CloudSim Tool -- 5.3 Algorithm Utilized in CloudSim Tool for Load Balancing -- 6 Experimental Results -- 7 Conclusion -- References. , Assessment of Load in Cloud Computing Environment Using C-means Clustering Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Resource Allocation -- 3.2 Algorithm -- 4 Result Analysis -- 5 Conclusion -- References -- Parallel Implementation of Algebraic Curve for Data Security in Cloud Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Explicit Addition Formulation -- 4 Implementation -- 4.1 Sequential Implementation Methodology -- 4.2 Parallel Implementation Methodology -- 5 Experimental Results and Analysis -- 5.1 Sequential Implementation of Elliptic Curve Addition -- 5.2 Sequential Implementation of Hyperelliptic Curve Addition -- 5.3 Parallel Implementation of Hyperelliptic Curve Addition -- 6 Performance Comparison of Sequential and Parallel Implementation -- 7 Conclusion -- References -- A Design Towards an Energy-Efficient and Lightweight Data Security Model in Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Proposed Approach and Related Discussions -- 4.1 Lightweight Authentication Using CA Based Scheme -- 4.2 Lightweight Cryptography Using CA Based Scheme -- 5 Conclusions and Future Work -- References -- Fuzzification-Based Routing Protocol for Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- Fuzzy-Based Strategy Management in Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- A TWV Classifier Ensemble Framework -- 1 Introduction -- 2 Proposed TWV Classifier Ensemble -- 3 Experimental Setup and Result Analysis -- 4 Conclusion -- References -- Recent Advancements in Continuous Authentication Techniques for Mobile-Touchscreen-Based Devices. , 1 Introduction to Continuous Authentication (CA).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    San Diego :Elsevier Science & Technology,
    Keywords: Textile industry-Waste disposal. ; Clothing trade-Waste disposal. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (360 pages)
    Edition: 1st ed.
    ISBN: 9780128187593
    Series Statement: The Textile Institute Book Series
    DDC: 363.728
    Language: English
    Note: Intro -- Waste Management in the Fashion and Textile Industries -- Copyright -- Contents -- Contributors -- Part One: Introduction -- Chapter 1: Fashion waste management problem and sustainability: A developing country perspective -- 1.1. Introduction -- 1.2. Waste management -- 1.2.1. 3R approach -- 1.2.2. Exchange and renting -- 1.2.3. Upcycling concept -- 1.2.4. Controlling waste by lean concepts -- 1.2.4.1. Minimizing process waste -- 1.2.4.2. Minimizing material waste -- 1.2.5. Effluent treatment -- 1.2.6. Fashion consumption and consumer attitude -- 1.2.7. Product life cycle assessment -- 1.2.8. Recyclability -- 1.3. Recycling of plastics (polyester and nylon) -- 1.4. Survey findings -- 1.5. Conclusions and future directions -- Acknowledgment -- References -- Chapter 2: Hazards of fashion and textile waste: Approaches for effective waste management -- 2.1. Introduction -- 2.2. Problems and hazards associated with raw material types -- 2.3. Hazards of wasteful utilization of toxic chemicals-Land, water, and air pollution -- 2.3.1. Problems and hazards associated with toxic chemicals -- 2.3.2. Problems and hazards associated with water and air pollution -- 2.3.3. Problems and hazards associated with soil infertility and degradation -- 2.4. Problems and hazards caused by textile and fashion waste -- 2.4.1. Textile waste and associated hazards -- 2.4.2. Hazards and waste from fashion industry -- 2.4.3. Hazards of overproduction in fashion industry -- 2.4.4. Deleterious impacts of fast fashion on environment -- 2.4.5. Hazards due to transport and shipment of fashion merchandise -- 2.4.6. Hazards due to improper buying and usage behavior of consumers -- 2.4.7. Hazards due to problematic recycling -- 2.4.8. Hazards associated with fashion waste -- 2.5. Waste management strategies to combat textile and fashion hazards. , 2.5.1. Role of designers in waste management -- 2.5.2. Waste management at the raw material procurement stage -- 2.5.3. Role of manufacturers in waste management -- 2.5.4. Waste management by minimal and effective utilization of chemicals and water -- 2.5.5. Waste management by effective utilization of water -- 2.5.6. Wastewater recycling and treatment -- 2.5.6.1. Wastewater treatment -- 2.5.7. Waste elimination at source and waste minimization -- 2.5.7.1. Product changes as means of waste minimization -- 2.5.7.2. Process changes as means of waste minimization -- 2.5.8. Waste management by recycling and regeneration -- 2.5.8.1. Recycling and regeneration techniques -- 2.5.9. Innovative approaches by fashion industry for waste management -- 2.5.9.1. Emergence of smart fashion -- 2.5.9.2. Introducing the concept of slow fashion -- 2.5.9.3. Principle of sharing economy -- 2.5.9.4. Extended producer responsibility (EPR) and in-store collection -- 2.5.9.5. Endorsing closed loop system -- 2.5.9.6. Raising consumer awareness -- 2.5.10. Role of brands in waste management -- 2.5.11. Role of consumers in waste management -- 2.5.12. Disposal ecology for waste management -- 2.6. Conclusions -- Further reading -- Part Two: Waste management technologies in manufacturing -- Chapter 3: Management of spinning and weaving wastes -- 3.1. Introduction -- 3.2. Classification of waste -- 3.3. Waste in spinning -- 3.3.1. Blow room -- 3.3.2. Carding -- 3.3.3. Draw frame -- 3.3.4. Combing -- 3.3.5. Simplex -- 3.3.6. Ring frame -- 3.3.7. Winding -- 3.4. Waste in weaving -- 3.4.1. Warping -- 3.4.2. Sizing -- 3.4.3. Knotting -- 3.4.4. Gaiting/tying-in wastage -- 3.4.5. Selvedge -- 3.4.6. Chindi -- 3.4.7. Beam residual wastage -- 3.5. Recycling of spinning and weaving waste -- 3.6. Machine for waste management -- 3.6.1. Willow machine -- 3.6.2. Marzoli trash analyzer. , 3.6.3. Marzoli recycling waste reopener (RWR) -- 3.6.4. Roving stripping and opening machine -- 3.6.5. Thread extractor (Bhatia, 2017) -- 3.6.6. Garnetting machine -- 3.7. Conclusions -- Acknowledgment -- References -- Chapter 4: Management of wastes in garment manufacturing -- 4.1. Introduction -- 4.2. The importance of marker planning and fabric waste management -- 4.3. Recycling fiber, yarn, and fabric wastes and recent trends -- 4.4. Bangladesh using cotton waste as a source of biogas -- 4.5. Solid waste from the Ethiopian leather sector -- 4.6. The control measures in waste management -- 4.6.1. What can be done to minimize wastes? -- Garneting -- Web preparation -- 3D weaving -- Composite manufacturing -- Compression molding -- Seamless garments -- 4.7. Conclusions and future directions -- References -- Chapter 5: Technologies for the management of wastewater generated in wet processing -- 5.1. Introduction -- 5.2. Control of effluent quality -- 5.2.1. Equalization -- 5.2.2. Recovery of by-products -- 5.2.3. Process modification -- 5.2.4. Loss of chemicals -- 5.2.5. Segregation -- 5.3. Effluent treatment methods -- 5.3.1. Coagulation, flocculation, and precipitation -- 5.3.2. Adsorption methods -- 5.3.3. Synthetic ion exchangers -- 5.3.3.1. Fiber-based synthetic bioabsorbents -- 5.3.4. Biological treatments -- 5.3.5. Oxidation techniques -- 5.3.6. Membrane separation -- 5.3.6.1. Microfiltration (MF) -- 5.3.6.2. Ultrafiltration (UF) -- 5.3.6.3. Nanofiltration (NF) -- 5.3.6.4. Hyperfiltration (HF)/reverse osmosis (RO) -- 5.3.7. Electrochemical processes -- 5.3.7.1. Electrodialysis -- 5.4. Effluent treatment plant -- 5.5. Conclusions -- References -- Chapter 6: Management of air quality -- 6.1. Introduction -- 6.2. Effluent gas -- 6.2.1. CO2 removal -- 6.2.1.1. Amine scrubbing -- 6.2.1.2. CO2 storage -- 6.2.2. SOx removal -- 6.2.3. NOx removal. , 6.2.4. Mercury removal -- 6.3. Volatile organic compounds (VOCs) -- 6.4. Activated carbon fibers -- 6.5. Alternative technologies -- 6.6. Conclusions -- Funding -- References -- Part Three: Retail and consumer waste management technologies -- Chapter 7: Packaging waste and their management technologies -- 7.1. Introduction -- 7.2. Packaging defined -- 7.3. Functions of packaging -- 7.4. Materials used for packaging -- 7.5. Consumer attitudes -- 7.6. Managing package waste -- 7.6.1. Recycle -- 7.6.2. Waste prevention or material minimization -- 7.6.3. Reuse -- 7.6.4. Compostable -- 7.6.5. Energy recovery -- 7.7. Conclusions and future directions -- References -- Chapter 8: End of life clothes and their management -- 8.1. Introduction -- 8.2. Collection of used clothing -- 8.3. Reuse of secondhand clothing -- 8.4. Redesign and remanufacturing -- 8.5. Recycling -- 8.5.1. Mechanical recycling -- 8.5.2. Thermal recycling -- 8.5.3. Chemical recycling -- 8.6. Energy recovery -- 8.7. Disposal to landfill -- 8.8. Conclusions -- References -- Chapter 9: Organizations and standards related to textile and fashion waste management and sustainability -- 9.1. Introduction -- 9.1.1. Waste management and sustainability -- 9.1.1.1. Green manufacturing and recycling in fashion -- Organic cotton -- Organic cotton production across the globe -- The opportunities and setting standards for organic cotton -- 9.1.1.2. Green distribution -- 9.1.1.3. Green retailing -- 9.2. Organizations for waste management and sustainability -- 9.2.1. Fashion brands -- 9.2.1.1. HandM -- 9.2.1.2. Marks and Spencer -- 9.2.1.3. Patagonia -- 9.2.1.4. Nike -- 9.2.2. Few other fashion brands -- 9.3. Standards for waste management and sustainability -- 9.3.1. Global organic textile standards (GOTS) -- 9.3.2. Sustainable textile production (STeP) by OEKO-TEX. , 9.3.3. Eco-label certification such as STANDARD 100 by OEKO-TEX -- 9.3.4. Bluesign -- 9.3.5. Cradle to cradle -- 9.3.6. International standards organization -- 9.3.7. Higg index and sustainable apparel coalition -- 9.4. Other organizations and events -- 9.4.1. Zero discharge of hazardous chemicals (ZDHC) -- 9.4.2. UNGC code of conduct for the fashion and textile industry -- 9.4.3. Copenhagen fashion summit -- 9.4.4. Dow Jones sustainability world index -- 9.4.5. Fashion transparency index -- 9.4.6. Youth fashion summit -- 9.4.7. Specific codes of conduct in Australia -- 9.4.8. Specific codes of conduct in Germany -- 9.5. Extended producer responsibility (EPR) for textiles -- 9.5.1. EPR program for postconsumer textiles and clothing recovery -- 9.6. Challenges and opportunities in waste management with Indian paradigms -- 9.6.1. Upasana studio, Auroville, India -- 9.6.1.1. Tsunamika -- 9.6.1.2. Small steps -- 9.6.2. Fabric Monde, Bengaluru -- 9.6.3. Pratibha Syntex, Indore -- 9.6.4. Stylumia, Bengaluru -- 9.7. Conclusions and future directions -- 9.7.1. Significant findings -- 9.7.2. Future directions -- References -- Part Four: Other waste management technologies -- Chapter 10: Automotive waste management technologies -- 10.1. Introduction -- 10.2. Automotive waste -- 10.2.1. Recycling and energy recovery -- 10.2.2. Mechanical recycling -- 10.2.3. Argon process -- 10.2.4. Thermal treatment process -- 10.2.4.1. Pyrolysis process -- 10.2.4.2. Sequential gasification and combustion -- 10.2.5. Injecting molding with automobile shredder residue -- 10.3. Recycling automotive composites and components -- 10.4. End of life (EOL) -- 10.5. Other applications -- 10.6. Conclusions -- Funding -- References -- Chapter 11: Waste management in coated and laminated textiles -- 11.1. Introduction -- 11.2. Coated and laminated textiles -- 11.2.1. Coated textiles. , 11.2.2. Nanomaterial incorporated coated textiles.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Blockchains (Databases). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (244 pages)
    Edition: 1st ed.
    ISBN: 9789813364707
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.219
    DDC: 658.05574
    Language: English
    Note: Intro -- Preface -- Editorial -- Contents -- About the Editors -- 1 Introduction to Blockchain Evolution, Architecture and Application with Use Cases -- 1.1 Layman's Introduction to Blockchain -- 1.2 The Blockchain Technology -- 1.3 Types of Blockchain -- 1.4 Evolution of Blockchain -- 1.4.1 Blockchain 1.0: Programmable Money and Cryptocurrencies -- 1.4.2 Blockchain 2.0: Smart Contracts -- 1.4.3 Blockchain 3.0: Decentralised Web -- 1.5 Ledger System for Blockchain -- 1.5.1 Centralized Ledger Systems -- 1.5.2 Distributed Ledger Systems -- 1.6 Layers of Blockchain -- 1.6.1 Hardware or Infrastructure Layer -- 1.6.2 Data Layer -- 1.6.3 Network Layer -- 1.6.4 Consensus Layer -- 1.6.5 Application Layer -- 1.7 Use Cases and Applications of Blockchain -- 1.8 Development Tools for Blockchain -- 1.9 Summary -- References -- 2 Blockchain: A Technology in Search of Legitimacy -- 2.1 Introduction -- 2.2 Theoretical Background -- 2.3 Research Design and Methodology -- 2.4 Results -- 2.5 Discussion and Conclusion -- References -- 3 Using Blockchain in Intermittently Connected Network Environments -- 3.1 Introduction -- 3.2 Overview of Delay Tolerant Networks -- 3.2.1 Features -- 3.2.2 Architecture -- 3.2.3 Routing -- 3.2.4 Applications -- 3.3 Rudimentary Elements of Blockchain -- 3.3.1 Blocks -- 3.3.2 Transaction -- 3.3.3 Mining -- 3.3.4 Ethereum and Smart Contracts -- 3.4 Integration of Blockchain Technology with DTNs -- 3.4.1 System Components -- 3.4.2 Generation and Transmission of Shelter Needs -- 3.4.3 Need Validation and Creation of Local Blockchain -- 3.4.4 Block Conversion Through API -- 3.4.5 Mining Blocks and Deploying to Global Blockchain -- 3.5 Open Research Areas -- 3.6 Conclusion -- References -- 4 Slaying the Crypto Dragons: Towards a CryptoSure Trust Model for Crypto-economics -- 4.1 Introduction: Blockchain and the Right to Be Forgotten. , 4.2 The New 'Crypto-economy'-A Fraudsters' Playground? -- 4.3 Blockchain: Sceptical ICT Professionalism and Legal Due Diligence -- 4.4 The Need for Trusted Third Parties and for Probative Electronic Evidence -- 4.5 Towards a CryptoSure Trust Model for Crypto-economics -- 4.6 Conclusions: Blockchain Versus Trust-The Expert Issues in Disputes Over Crypto Assets -- 5 Decentralized Governance for Smart Contract Platform Enabling Mobile Lite Wallets Using a Proof-of-Stake Consensus Algorithm -- 5.1 Introduction -- 5.2 Preliminaries for Qtum Decentralized Blockchain Governance -- 5.3 Qtum Basic Requirement Sets for Decentralized Governance -- 5.3.1 UTXO Versus Account Model -- 5.3.2 Consensus Management -- 5.3.3 Mutualized Proof-of-Stake -- 5.3.4 AAL and EVM Integration -- 5.4 Scalability Extension of the Virtual Machine Through Decentralized Governance -- 5.4.1 Qtum Transaction Processing Using Virtual Machine -- 5.4.2 Decentralised Governance Protocol -- 5.5 Qtum Account Abstraction Layer -- 5.6 Discussion of the Technical Governance Realization -- 5.6.1 Hard fork Update -- 5.6.2 Qtum X86 Virtual Machine -- 5.7 Conclusions -- References -- 6 Blockchain Technology: Security and Privacy Issues -- 6.1 Introduction -- 6.2 Distributed Ledger Technology -- 6.2.1 Blockchain Benefits -- 6.2.2 How Blockchain Works -- 6.2.3 Consensus Algorithms -- 6.3 Blockchain Pros and Cons -- 6.4 Applications of Blockchain -- 6.4.1 Blockchain 1.0 -- 6.4.2 Blockchain 2.0 -- 6.5 Blockchain Security Issues -- 6.5.1 Cryptojacking Attacks -- 6.5.2 51% Attack -- 6.5.3 Smart Contract Attacks -- 6.6 Discussion -- 6.6.1 Voting and Blockchain -- 6.6.2 Energy and Blockchain -- 6.6.3 Web 3.0 and Blockchain -- 6.7 Conclusions -- References -- 7 Personal Data Protection in Blockchain with Zero-Knowledge Proof -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Background About Blockchain. , 7.4 Personal Data Protection and Blockchain -- 7.5 Zero-Knowledge Proof on Blockchain -- 7.5.1 Zerocoin Protocol -- 7.5.2 Zerocash Protocol -- 7.5.3 Zcash and Zk-SNARK -- 7.6 Conclusion -- References -- 8 Design and Verification of Privacy Patterns for Business Process Models -- 8.1 Introduction -- 8.2 A Privacy-Aware System Using Blockchain -- 8.2.1 Scenario: A Cloud-Based Order System -- 8.3 GDPR Verification -- 8.3.1 Design Time Verification -- 8.3.2 Runtime Verification -- 8.4 Experimental Results -- 8.4.1 Evaluation of Design Time Verification -- 8.4.2 Evaluation of Runtime Verification -- 8.5 Conclusion -- References -- 9 Blockchain Technology in Energy Field: Opportunities and Challenges -- 9.1 Introduction -- 9.2 Blockchain Solutions for Energy Internet -- 9.3 Application Scenarios of Blockchain Technology in the Energy Industry -- 9.4 Challenges -- 9.5 Conclusions -- References -- 10 BlockChainTechnology for Energy Transition -- 10.1 Introduction -- 10.2 What Is the "Energy Transition"? -- 10.2.1 Business Models in the Energy Sector -- 10.2.2 New Business Models for Energy Transition -- 10.3 BlockChain and Smart Contracts in the Energy Sector -- 10.3.1 Types of Applications of BlockChain and Smart Contracts in the Energy Sector -- 10.3.2 New Business Models Enabled by BlockChain in the Energy Market -- 10.3.3 Risks and Issues Related to BlockChain and Smart Contracts -- 10.4 The Framework -- 10.4.1 The Business Model Canvas -- 10.4.2 The Use Case Selection -- 10.4.3 Impact Analysis of the Two Selected Use Cases -- 10.4.4 The Business Models for the Use Cases -- 10.4.5 Microgrid Business Model (Elaborated After the Workshop) -- 10.4.6 Discussion of the Results -- 10.5 Current Trends and Future Scenarios -- 10.5.1 P2P Distributed Energy Trading for Residential Microgrids. , 10.5.2 Bridging Industrial and Residential Microgrids Through Electric Vehicles -- 10.6 Conclusions -- References -- 11 The Feasibility and Significance of Employing Blockchain-Based Identity Solutions in Health Care -- 11.1 Introduction -- 11.2 A Brief History of Identities in the Digital Age -- 11.2.1 Fully Centralized Identity Management -- 11.2.2 Federated Identity Management -- 11.2.3 User-Centric Identity Management -- 11.3 The Main Ideas Behind Decentralized Identity Management -- 11.3.1 Decentralized Identifier Based on Blockchain -- 11.3.2 Zero-Knowledge Proof -- 11.3.3 Decentralized Blockchains and the Internet -- 11.4 The Technical Architecture of Decentralized Identity Management -- 11.4.1 Architecture Overview -- 11.4.2 Blockchain-Based DID Service -- 11.4.3 Standardization of DIDs -- 11.4.4 Examples of DID Frameworks -- 11.5 The Potential of Applying Blockchain-Based DID Solutions in Health Care -- 11.5.1 Addressing the Patient Mismatching Problem -- 11.5.2 Facilitating Patient Recruitment in Clinical Research Using DID -- 11.5.3 The Safer Use of Medical Devices -- 11.5.4 Limitations Facing Current Blockchain-Based DID Solutions -- 11.6 Conclusion -- References -- 12 Toward eHealth with Blockchain: Success Factors for Crowdfunding with ICOs -- 12.1 Introduction -- 12.2 Theoretical Background -- 12.2.1 eHealth -- 12.2.2 Initial Coin Offerings (ICOs) and Blockchain -- 12.2.3 Signaling Theory -- 12.3 Research Method -- 12.3.1 Related Work -- 12.4 Research Hypotheses -- 12.4.1 Data and Variables -- 12.5 Results and Discussion -- 12.5.1 Descriptive Statistics of the ICO Data -- 12.5.2 Multivariate Analysis of the Factors Influencing the Success -- 12.6 Discussion -- 12.7 Conclusion -- References -- 13 Blockchain Track and Trace System (BTTS) for Pharmaceutical Supply Chain -- 13.1 Introduction -- 13.2 Related Works. , 13.3 Overview of Bitcoin, Blockchain Platforms and Smart Contracts -- 13.4 The Proposal Model -- 13.4.1 Structure of Blockchain Track and Trace System (BTTS) -- 13.4.2 The Proposed Smart Contracts -- 13.5 Conclusion and Future Works -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Soft computing -- Congresses. ; Problem solving -- Data processing -- Congresses. ; Engineering. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (571 pages)
    Edition: 1st ed.
    ISBN: 9788132216957
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.250
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- 1 Research on Hierarchical Clustering Algorithm Based on Cluster Outline -- Abstract -- 1…Introduction -- 2…Definition and Solution -- 2.1 The Definition of Boundary Point and Cluster Outline -- 2.2 The Solution of Cluster Outline -- 3…The Design of Hierarchical Clustering Algorithm Based on Cluster Outline -- 3.1 The Clustering Between Clusters -- 3.2 The Clustering Between Clusters and Outliers -- 3.3 The Process of the Algorithm -- 4…The Experimental Analysis -- 5…Conclusions -- Acknowledgments -- References -- 2 Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things -- Abstract -- 1…Introduction -- 2…The Remote Diagnosis System Designment of the Air Compressor Using Internet of Things -- 3…Field Information Collection with the Internet of Things Technology -- 4…To Realize Remote Monitoring Using Communication Technology -- 5…To Build Fault Model -- 6…To Establish Fault Diagnosis Expert System -- 7…Summary -- Acknowledgments -- References -- 3 An Enhancement Algorithm Based on Fuzzy Sets Algorithm Using Computer Vision System for Chip Image Processing -- Abstract -- 1…Introduction -- 2…Related Works -- 2.1 Image Enhancement -- 2.2 Vision-Based Detection System -- 2.3 Image Edge -- 3…Methodology -- 3.1 Introduction of Fuzzy Sets -- 4…Results and Discussion -- 5…Conclusions -- References -- 4 Development of DDoS Attack Defense System Based on IKEv2 Protocol -- Abstract -- 1…Introduction -- 2…IKEv2 Protocol Analysis and Design -- 3…Development of DDoS Attack Defense System Based on IKEv2 Protocol -- 4…Conclusions -- References -- 5 Power Data Network Dynamic Simulation Platform -- Abstract -- 1…Introduction -- 2…Introduction of Existing Simulation Technology -- 3…Dynamic Simulation Platform for the Design of the Electric Power Data Network. , 3.1 Logical Structure -- 3.2 Hierarchy -- 4…Working Mechanism of Power Data Network Dynamic Simulation Platform -- 4.1 Simulate the Dynamic Interaction Objects -- 4.2 Dynamic Mock Object -- 4.3 Different Levels of Dynamic Change Agreement -- 4.4 Simulation Performance Improvements -- 5…Conclusions -- Acknowledgments -- 6 An Emotional Model Based on Multiple Factors -- Abstract -- 1…Introduction -- 2…Problem Description and Approach -- 2.1 Problem Description -- 2.2 Perception Module -- 2.3 Subconscious Module -- 2.4 Inside Variable Module -- 2.5 Character Module -- 2.6 Mood Module -- 2.7 Emotion Module -- 2.8 Behavior Module -- 3…Experiments and Results -- 3.1 Experiments -- 3.2 Results -- 4…Conclusions -- 7 Multi-Source and Heterogeneous Knowledge Organization and Representation for Knowledge Fusion in Cloud Manufacturing -- Abstract -- 1…Introduction -- 1.1 Cloud Manufacturing -- 1.2 Knowledge Fusion and Service -- 2…Analysis of Knowledge Resources and Requirements for Knowledge Organization and Representation of Group Corporation in Cloud Manufacturing -- 2.1 Features of Group Corporation Knowledge Management and Knowledge Resource Classification -- 2.2 Requirement Analysis of Knowledge Organization and Representation in Group Corporation -- 3…Knowledge Organization and Representation Model for Knowledge Fusion -- 3.1 Knowledge Unit -- 3.2 Fusion Knowledge -- 4…Framework of Knowledge Fusion and Service in Cloud Manufacturing -- 5…Conclusions -- References -- 8 Research of Dynamics and Deploying Control Method on Tethered Satellite -- Abstract -- 1…Introduction -- 2…A System Dynamics Model -- 3…Analyze the Values of System Parameters -- 4…Simulation and Analysis -- 5…Conclusions -- References -- 9 Using Auto-Associative Neural Networks for Signal Recognition Technology on Sky Screen -- Abstract -- 1…Introduction. , 2…Hopfield Associative Neural Network -- 2.1 Discrete Hopfield Network Theory -- 3…Application of Hopfield Network for Typical Projectile Signal -- 3.1 Extraction of Pattern Feature -- 3.2 Associative Memory Algorithm for Discrete Hopfield Neural Networks -- 3.3 Simulation and Application for Typical Signal of Sky Screens -- 4…Results -- References -- 10 Research on the Hotspot Information Push System for the Online Journal Based on Open-Source Framework -- Abstract -- 1…Introduction -- 2…Key Technologies -- 2.1 HttpClient -- 2.2 HTMLParser -- 2.3 IKAnalyzer -- 3…The Realization of the System Framework -- 4…Examples -- 5…Summary -- Acknowledgments -- References -- 11 Development of Control System of Wheel Type Backhoe Loader -- Abstract -- 1…Introduction -- 2…The Features of CAN Bus Control System -- 3…Design of the Architecture of CAN Bus Control System -- 3.1 Typical Architecture of CAN Bus Control System -- 3.2 The Architecture of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4…Principle and Functions of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4.1 The Control of Loading Operation -- 4.2 The Control of Excavating Operation -- 4.3 System Indication and Failure Alarm Control -- 5…The Features of the Control System of Wheel Type Backhoe Loader -- 6…Conclusions -- References -- 12 Some Results on Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Abstract -- 1…Introduction -- 2…Review of Preliminaries -- 3…Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Acknowledgments -- References -- 13 CGPS: A Collaborative Game in Parking-Lot Search -- Abstract -- 1…Introduction -- 2…The Parking-Lot Searching Scenario -- 3…Algorithm Analysis -- 3.1 Opponent Selection -- 3.2 Game Analysis -- 4…Simulation Analysis -- 5…Conclusions -- References. , 14 A Fuzzy-Based Context-Aware Privacy Preserving Scheme for Mobile Computing Services -- Abstract -- 1…Introduction -- 2…Privacy Challenge of Mobile Computing -- 3…System Overview -- 3.1 Architecture -- 3.2 Context Modeling -- 3.3 Fuzzy-Reasoning Process -- 4…Evaluation -- 5…Conclusions -- Acknowledgments -- References -- 15 Research and Application of Trust Management System -- Abstract -- 1…Introduction -- 2…Trust Management Architecture -- 3…Trust Evaluation Method -- 4…Simulation and Application -- 4.1 A Simulation -- 4.2 Performance Discussion -- 5…Conclusions and Future Work -- Acknowledgments -- References -- 16 Ranaad-Xek: A Prototype Design of Traditional Thai Musical Instrument Application for Android Tablet PC -- Abstract -- 1…Introduction -- 2…Ranaad-Xek -- 2.1 Ranaad-Xek's Composition -- 2.2 Ranaad-Xek Percussions -- 3…Application Specification and Architecture -- 3.1 Framework -- 3.2 Application Specification -- 3.3 Application Architecture -- 3.4 The Playing Mode -- 3.5 Recording System -- 3.6 GUI Design -- 4…Conclusions -- Acknowledgments -- References -- 17 Identifying Accurate Refactoring Opportunities Using Metrics -- Abstract -- 1…Introduction -- 2…Relate Work -- 2.1 Cloned Code -- 2.2 The Difficulties of Identifying Refactoring Opportunities -- 3…An Approach to Identifying Refactoring Opportunities with Metrics -- 3.1 Benefits -- 3.2 Costs -- 3.3 Evaluation of the Benefit and Cost -- 4…Future Work -- Acknowledgments -- References -- 18 Research on Neural Network Predictive Control of Induction Motor Servo System for Robot -- Abstract -- 1…Introduction -- 2…Servo System Modeling -- 3…The Predictive Control Servo System Based on BP Neural Network -- 3.1 Control Structures -- 3.2 Neural Network Predictive Model -- 3.3 Feedback Correction -- 3.4 Scroll Optimization -- 3.5 Neural Network Predictive Control Algorithm Steps. , 4…MATLAB Simulation and Analysis -- Acknowledgments -- References -- 19 Research on Scale-Out Workloads and Optimal Design of Multicore Processors -- Abstract -- 1…Introduction -- 2…Scale-out Workloads -- 3…Experiment and Analysis -- 3.1 Throughput -- 3.2 Latency -- 4…Optimal Design of Multicore Processors for Scale-out Workloads -- 5…Related Work -- 6…Conclusions -- Acknowledgments -- References -- 20 Study of Modified Montgomery's Algorithm and Its Application to 1,024-bit RSA -- Abstract -- 1…Introduction -- 2…RSA Cryptosystem -- 2.1 Montgomery Algorithm and Modified Montgomery Algorithm -- 2.2 Four-to-two CSA -- 2.3 Modified R-L Binary Algorithm -- 3…Algorithm Implementation -- 3.1 Four-to-two Architecture -- 3.2 Modified R-L Binary Architecture -- 4…Conclusions -- References -- 21 A MVS-Based Object Relational Model of the Internet of Things -- Abstract -- 1…Introduction -- 2…MVS-Based Object Relational Model of the Internet of Things -- 2.1 Construction of Basic Data Model -- 2.2 Calculation of Properties' Characteristics of the Internet of Things -- 3…Experimental Verification and Conclusion -- References -- 22 Rateless Code-Based Unequal Loss Protection for Layer-Coded Media Delivery -- Abstract -- 1…Introduction -- 2…ULP-Strider Coding System -- 2.1 Decoding Algorithm -- 2.2 Encoding Process -- 2.3 Analyzing the Construction of Redundancy -- 3…Simulation -- 3.1 Random Sequence Versus Fine-Designed Sequence -- 3.2 Extra Information from Soft Hint -- 3.3 Strider Versus ULP-Strider -- 4…Conclusions -- Acknowledgments -- References -- 23 Construction of the Grade-3 System for GJB5000A-2008 -- Abstract -- 1…Current Software Engineering Process Overview -- 2…Analysis of the Correlation and the Necessity of Fusion Between GJB5000A-2008 and Software Engineering Process -- 3…Built Process System Based on the Software Engineering. , 4…Process Instance Analysis.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...